Color image chaos encryption algorithm combining CRC and nine palace map

  • Zenggang XiongEmail author
  • Yuan WuEmail author
  • Conghuan Ye
  • Xuemin Zhang
  • Fang Xu


The color image encryption algorithm based on the chaos theory is not strong enough. In this paper, we proposed a color image chaos encryption algorithm combining Cyclic Redundancy Check (CRC) and nine palace map. Firstly, the pixel data of the plain image were moved and shuffled based on the theory of nine palace map. And the R, G and B components were extracted and converted into a binary sequence matrix that was then cyclically shifted based on the technology of generating CRC code. Finally, the encrypted image was derived from the XOR operation with random key matrix. The average entropy of encrypted image by our algorithm is 7.9993, which is slight improved compared with the coupled hyper chaotic Lorenz algorithm in previous studies. In addition, the algorithm has the advantages of large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency.


Color image encryption Cyclic redundancy check (CRC) Nine palace map Logistic map Cross shift 



This work was supported by the National Natural Science Foundation of China (No.61502154, 61370092), Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (T201410), the MOE (Ministry of Education in China) Project of Humanities and Social Sciences (17YJCZH203).


  1. 1.
    AqeelurRehman LX, Hahsmi MA et al (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos[J]. Optik 153Google Scholar
  2. 2.
    Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos[J]. Signal Process 128:155–170CrossRefGoogle Scholar
  3. 3.
    Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems[J]. Multimed Tools Appl 76(1):1159–1175CrossRefGoogle Scholar
  4. 4.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197–213CrossRefGoogle Scholar
  5. 5.
    Chen W B, Xin Z (2006) Image encryption algorithm based on Henon chaotic system[C]// International Conference on Image Analysis and Signal Processing. IEEE 1–6Google Scholar
  6. 6.
    Chen J, Zhang Y, Qi L et al (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression[J]. Opt Laser Technol 99Google Scholar
  7. 7.
    Fu C, Chen ZF, Zhao W et al (2017) A new fast color image encryption scheme using chen chaotic system[C]// Ieee/acis international conference on software engineering, artificial intelligence, NETWORKING and parallel/distributed computing. IEEE:121–126Google Scholar
  8. 8.
    Hua Z, Yi S, Zhou Y (2017) Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Process 144Google Scholar
  9. 9.
    Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections[J]. Optik – Int J Light Electron Opt 129:231–238CrossRefGoogle Scholar
  10. 10.
    Kanafchian M, Fathi-Vajargah BA (2017) Novel image encryption scheme based on Clifford attractor and Noisy logistic map for secure transferring images in navy [J]. Int J e-Navig Maritime Econ 6:53–63Google Scholar
  11. 11.
    Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images [J]. Opt Lasers Eng 90:196–208CrossRefGoogle Scholar
  12. 12.
    Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography[J]. Signal Process 125(C):187–202CrossRefGoogle Scholar
  13. 13.
    Lan R, He J, Wang S, et al. (2018) Integrated Chaotic Systems for Image Encryption [J]. Signal ProcessingGoogle Scholar
  14. 14.
    Li Y, Dai W, Ming Z et al (2016) Privacy protection for preventing data over-collection in Smart City[J]. IEEE Trans Comput 65(5):1339–1350MathSciNetCrossRefGoogle Scholar
  15. 15.
    Liu H, Jin CA (2017) Novel color image encryption algorithm based on quantum Chaos sequence[J]. 3D Res 8(1):4CrossRefGoogle Scholar
  16. 16.
    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps[J]. Comput Math Appl 59(10):3320–3327MathSciNetCrossRefGoogle Scholar
  17. 17.
    Mahesh M, Srinivasan D, Kankanala M et al (2015) Image cryptography using discrete Haar wavelet transform and Arnold cat map [C]// international conference on communications and signal processing. IEEE:1849–1855Google Scholar
  18. 18.
    Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images [J]. Pattern Recogn 38(7):1111–1115CrossRefGoogle Scholar
  19. 19.
    Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps[J]. Multimed Tools Appl 76:1–23Google Scholar
  20. 20.
    Parvaz R, Zarebnia M (2017) A combination chaotic system and application in color image encryption[J]Google Scholar
  21. 21.
    Ping P, Xu F, Mao Y et al (2017) Designing permutation-substitution image encryption networks with Henon map[J]. NeurocomputingGoogle Scholar
  22. 22.
    Qiu H, Memmi G (2014) Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration[C]// IEEE International Symposium on Multimedia. IEEEGoogle Scholar
  23. 23.
    Qiu H, Memmi G, Noura H (2017) An efficient secure storage scheme based on information fragmentation[C]// IEEE international conference on Cyber Security & Cloud Computing. IEEEGoogle Scholar
  24. 24.
    Sankpal PR, Vijaya PA (2014) Image encryption using chaotic maps: a survey[C]// international conference on Signal & Image Processing. IEEE:102–107Google Scholar
  25. 25.
    Sokouti M, Sokouti BA (2018) PRISMA-compliant systematic review and analysis on color image encryption using DNA properties[J]. Comput Sci Rev 29:14–20CrossRefGoogle Scholar
  26. 26.
    Sosa C, Sutton B C, Huang H H (2010) PicFS: The Privacy-Enhancing Image-Based Collaborative File System[C]// IEEE International Conference on Parallel & Distributed Systems. IEEE Computer SocietyGoogle Scholar
  27. 27.
    Su Y, Tang C, Chen X et al (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map[J]. Optics & Lasers in. Engineering 88:20–27Google Scholar
  28. 28.
    Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation[J]. Multimed Tools Appl 77(10):1–14Google Scholar
  29. 29.
    Wang X, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Opt Commun 342:51–60CrossRefGoogle Scholar
  30. 30.
    Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map[M]. Elsevier Science Publishers B. VGoogle Scholar
  31. 31.
    Ye C, Xiong Z, Ding Y et al (2014) Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks[J]. J Vis Lang Comput 25(6):658–666CrossRefGoogle Scholar
  32. 32.
    Ye C, Xiong Z, Ding Y et al (2016) Joint fingerprinting and encryption in the DWT domain for secure M2M communication[J]. Int J Sec Appl 10(1):125–138Google Scholar
  33. 33.
    Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos [J]. Optics & Lasers in. Engineering 92:6–16Google Scholar
  34. 34.
    Zhang YQ, Wang XY, Liu J et al (2016) An image encryption scheme based on the MLNCML system using DNA sequences[J]. Opt Lasers Eng 82:95–103CrossRefGoogle Scholar
  35. 35.
    Zhang Y, Qiu M, Tsai CW et al (2017) Health-CPS: healthcare cyber-physical system assisted by cloud and big data[J]. IEEE Syst J 11(1):88–95CrossRefGoogle Scholar
  36. 36.
    Zhou N, Chen W, Yan X et al (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system[J]. Quantum Inf Process 17(6):137MathSciNetCrossRefGoogle Scholar
  37. 37.
    Zhu L, Li W, Liao L et al (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping[C]// international conference on intelligent information hiding and multimedia. IEEE Comput Soc:601–604Google Scholar
  38. 38.
    Wu Y, Hu F, Min G et al(2017) Big Data and Computational Intelligence in Networking[M].Taylor & Francis/CRC, Boca RatonGoogle Scholar
  39. 39.
    Cheng X, Wu Y, Min G et al (2018) Network Function Virtualization in Dynamic Networks: A Stochastic Perspective[J]. IEEE J Sel Areas Commun 36(10):2218–2232Google Scholar
  40. 40.
    Ma Y, Wu Y, Ge J et al (2018) An Architecture for Accountable Anonymous Access in the Internet-of-Things Network[J]. IEEE Access 6:14451–14461Google Scholar
  41. 41.
    Huang C, Min G, Wu Y et al (2017) Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems[J]. IEEE Transactions on Big Data (99):1–1Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer and Information ScienceHubei Engineering UniversityXiaoganChina
  2. 2.School of Computer Science and Information EngineeringHubei UniversityWuhanChina

Personalised recommendations